Article
13 FAQs on Switching from Query/400 to Sequel
By Heath Kath on Wed, 10/20/2021
Find out why you should choose Sequel Data Access for your IBM i queries—and leave Query/400 behind.
On-Demand Webinar
Malware on Power Systems Servers: Breaking Down the Myths
By Sandi Moore
Learn how malware and viruses have successfully infiltrated Linux, AIX, and IBM i systems and get expert tips for protecting your servers.
On-Demand Webinar
How to Modernize Your Query/400 Queries
Sequel software makes your transition to modern data access and analysis from Query/400 simple. Watch this webinar to see how.
On-Demand Webinar
What’s New with Sequel?
Watch this webinar to learn the latest enhancements to Sequel, business intelligence software for IBM i.
On-Demand Webinar
How a Remote Workforce Affects IBM i Security
By Sandi Moore
In this webinar, IBM i security expert Sandi Moore provides valuable information to help minimize your exposure to malware and viruses, even with a remote workforce.
On-Demand Webinar
What Does Digital Transformation Mean for IBM i Data?
Digital transformation is not just a buzzword. It opens the door to deeper insight from your data. Watch this webinar to learn more!
On-Demand Webinar
Combating Ransomware: Building a Strategy to Prevent and Detect Attacks
By Bob Erdman
Go in-depth on the ransomware attack cycle, the need to protect every endpoint, and how to spot signs of infection before data is encrypted by malicious actors.
On-Demand Webinar
What Is Your Data Trying to Tell You?
Watch this recorded webinar to learn how to translate and deliver lots of data from IBM i and other sources into clear and actionable stories
On-Demand Webinar
Security Bulletin: Malware Infection Discovered on IBM i Server!
By Sandi Moore
Noted IBM i security expert Sandi Moore explains the facts about viruses on IBM i. Watch and learn how to ensure you're fully protected.
On-Demand Webinar
For Developers, By Developers at Fortra
During this session, you’ll see live demonstrations of how Fortra developer tools can help you.
On-Demand Webinar
IBM i Access Client Solutions for Data Access
During this recorded webinar, the IBM i experts from Fortra help you get a better understanding of Access Client Solutions (ACS).
On-Demand Webinar
Sequel Client Tables (a.k.a. Pivot Tables on Steroids)
Everything and anything around Client Tables in Sequel is covered in this on-demand webinar.
On-Demand Webinar
How to Transfer IBM i Data to Microsoft Excel
During this recorded webinar, our data access experts demonstrate how you can simplify the process of getting data from multiple sources—including Db2 for i—into Excel.
Blog
3 Reasons to Go Beyond Writing Queries in SQL
Sun, 11/29/2020
Still writing queries in SQL? Sure, it’s a powerful way to access IBM i data. But is it enough?
Product Video
Watch a Demo of Powertech Antivirus
Powertech Antivirus provides native virus scanning on your server environment and helps ward off threats. Security teams can take advantage of one of the most comprehensive sets of virus signatures.
In this demo, you'll see how Powertech Antivirus can help take control and eliminate potential threats by providing:
Native scanning for IBM i, AIX, Linux x86, Linux on IBM Z, LinuxONE, and...
On-Demand Webinar
How to Work with Data from IBM i and Remote Databases
Watch this webinar to get insights from our expert on bringing data all together into one solution and work with it easily.
Blog
Endpoint Antivirus Software: What It Is, and Why You Need It
By Bob Erdman on Mon, 10/19/2020
The threat landscape can be a frightening scene when you look at the malicious attacks and ransomware infiltrating organizations around the globe. The good news: Endpoint antivirus applications are making enormous strides in their ability to protect enterprise-level equipment and data from attack. The bad news: Many companies overlook the need to secure non-Windows infrastructure and focus their...
Blog
The Evolution of Cybersecurity Solutions for Organizations
Tue, 08/11/2020
In the early days of the internet, cybersecurity was fairly straightforward, with all solutions and strategies geared toward prevention. While prevention remains critical, cybersecurity has also had to evolve, with businesses layering their defenses and regularly evaluating the status of their safeguards to adapt to change—whether those be organizational or within the wider cybersecurity sphere.
Article
FAQ: How Does Sequel Data Access Go Beyond SQL?
Mon, 08/10/2020
Got questions about moving beyond SQL to Sequel Data Access? Get answers, and get the business intelligence your organization needs from your IBM i data.